PowerSwitch S4048T-ON

Dell PowerSwitch S4048T-ON User guide

  • Hello! I am an AI chatbot trained to assist you with the Dell PowerSwitch S4048T-ON User guide. I’ve already reviewed the document and can help you find the information you need or explain it in simple terms. Just ask your questions, and providing more details will help me assist you more effectively!
Dell EMC Configuration Guide for the
S4048T–ON System
9.14.2.5
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2019 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
2020 - 01
Rev. A00
1 About this Guide......................................................................................................................... 33
Audience............................................................................................................................................................................... 33
Conventions......................................................................................................................................................................... 33
Related Documents.............................................................................................................................................................33
2 Configuration Fundamentals....................................................................................................... 34
Accessing the Command Line............................................................................................................................................34
CLI Modes............................................................................................................................................................................ 34
Navigating CLI Modes...................................................................................................................................................36
The do Command................................................................................................................................................................38
Undoing Commands............................................................................................................................................................39
Obtaining Help..................................................................................................................................................................... 39
Entering and Editing Commands....................................................................................................................................... 39
Command History................................................................................................................................................................40
Filtering show Command Outputs.................................................................................................................................... 40
Multiple Users in Configuration Mode............................................................................................................................... 41
3 Getting Started..........................................................................................................................42
Console Access....................................................................................................................................................................42
Serial Console.................................................................................................................................................................42
Accessing the CLI Interface and Running Scripts Using SSH....................................................................................... 43
Default Configuration..........................................................................................................................................................44
Configuring a Host Name................................................................................................................................................... 44
Accessing the System Remotely.......................................................................................................................................44
Configure the Management Port IP Address.............................................................................................................44
Configure a Management Route................................................................................................................................. 45
Configuring a Username and Password..................................................................................................................... 45
Configuring the Enable Password..................................................................................................................................... 46
Configuration File Management........................................................................................................................................ 46
Copy Files to and from the System.............................................................................................................................46
Mounting an NFS File System......................................................................................................................................47
Save the Running-Configuration................................................................................................................................. 48
Configure the Overload Bit for a Startup Scenario...................................................................................................49
Viewing Files...................................................................................................................................................................49
Compressing Configuration Files.................................................................................................................................50
Managing the File System..................................................................................................................................................52
Enabling Software Features on Devices Using a Command Option.............................................................................52
View Command History......................................................................................................................................................53
Upgrading Dell EMC Networking OS................................................................................................................................54
Verify Software Images Before Installation......................................................................................................................54
Using HTTP for File Transfers...........................................................................................................................................55
4 Management..............................................................................................................................57
Configuring Privilege Levels............................................................................................................................................... 57
Contents
Contents 3
Removing a Command from EXEC Mode..................................................................................................................58
Moving a Command from EXEC Privilege Mode to EXEC Mode........................................................................... 58
Allowing Access to CONFIGURATION Mode Commands....................................................................................... 58
Allowing Access to Different Modes...........................................................................................................................58
Applying a Privilege Level to a Username...................................................................................................................60
Applying a Privilege Level to a Terminal Line............................................................................................................. 60
Configuring Logging............................................................................................................................................................60
Audit and Security Logs................................................................................................................................................60
Configuring Logging Format ................................................................................................................................ 62
Display the Logging Buffer and the Logging Configuration.....................................................................................62
Setting Up a Secure Connection to a Syslog Server.......................................................................................63
Sending System Messages to a Syslog Server..........................................................................................................64
Track Login Activity............................................................................................................................................................ 64
Restrictions for Tracking Login Activity......................................................................................................................64
Configuring Login Activity Tracking............................................................................................................................ 64
Display Login Statistics................................................................................................................................................. 65
Limit Concurrent Login Sessions.......................................................................................................................................66
Restrictions for Limiting the Number of Concurrent Sessions................................................................................66
Configuring Concurrent Session Limit........................................................................................................................ 66
Enabling the System to Clear Existing Sessions........................................................................................................67
Enabling Secured CLI Mode...............................................................................................................................................67
Log Messages in the Internal Buffer.................................................................................................................................68
Disabling System Logging...................................................................................................................................................68
Sending System Messages to a Syslog Server............................................................................................................... 68
Configuring a UNIX System as a Syslog Server........................................................................................................ 68
Changing System Logging Settings..................................................................................................................................69
Display the Logging Buffer and the Logging Configuration...........................................................................................69
Configuring a UNIX Logging Facility Level....................................................................................................................... 70
Synchronizing Log Messages............................................................................................................................................. 71
Enabling Timestamp on Syslog Messages.........................................................................................................................71
File Transfer Services..........................................................................................................................................................74
Enabling the FTP Server...............................................................................................................................................74
Configuring FTP Server Parameters...........................................................................................................................74
Configuring FTP Client Parameters............................................................................................................................ 75
Terminal Lines...................................................................................................................................................................... 75
Denying and Permitting Access to a Terminal Line...................................................................................................75
Configuring Login Authentication for Terminal Lines................................................................................................76
Setting Timeout for EXEC Privilege Mode.......................................................................................................................77
Using Telnet to get to Another Network Device.............................................................................................................78
Lock CONFIGURATION Mode...........................................................................................................................................78
LPC Bus Quality Degradation.............................................................................................................................................79
Restoring the Factory Default Settings............................................................................................................................79
Restoring Factory Default Environment Variables.................................................................................................... 80
Viewing the Reason for Last System Reboot...................................................................................................................81
5 802.1X.......................................................................................................................................82
Port-Authentication Process............................................................................................................................................. 83
EAP over RADIUS..........................................................................................................................................................84
Configuring 802.1X..............................................................................................................................................................84
Important Points to Remember.........................................................................................................................................85
4
Contents
Enabling 802.1X................................................................................................................................................................... 85
Configuring Request Identity Re-Transmissions............................................................................................................. 86
Configuring a Quiet Period after a Failed Authentication.........................................................................................87
Forcibly Authorizing or Unauthorizing a Port...................................................................................................................88
Re-Authenticating a Port................................................................................................................................................... 88
Configuring Timeouts..........................................................................................................................................................89
Configuring Dynamic VLAN Assignment with Port Authentication..............................................................................90
Guest and Authentication-Fail VLANs...............................................................................................................................91
Configuring a Guest VLAN............................................................................................................................................91
Configuring an Authentication-Fail VLAN................................................................................................................... 91
6 Access Control List (ACL) VLAN Groups and Content Addressable Memory (CAM)..........................93
Optimizing CAM Utilization During the Attachment of ACLs to VLANs......................................................................93
Guidelines for Configuring ACL VLAN Groups................................................................................................................ 93
Configuring ACL VLAN Groups and Configuring FP Blocks for VLAN Parameters................................................... 94
Configuring ACL VLAN Groups................................................................................................................................... 94
Configuring FP Blocks for VLAN Parameters............................................................................................................95
Viewing CAM Usage........................................................................................................................................................... 95
Allocating FP Blocks for VLAN Processes....................................................................................................................... 97
Unified Forwarding Table (UFT) Modes...........................................................................................................................97
Configuring UFT Modes................................................................................................................................................97
7 Access Control Lists (ACLs)........................................................................................................98
IP Access Control Lists (ACLs)......................................................................................................................................... 99
CAM Usage.................................................................................................................................................................... 99
Implementing ACLs on Dell EMC Networking OS................................................................................................... 100
Important Points to Remember........................................................................................................................................ 101
Configuration Task List for Route Maps....................................................................................................................101
Configuring Match Routes..........................................................................................................................................103
Configuring Set Conditions.........................................................................................................................................104
Configure a Route Map for Route Redistribution....................................................................................................105
Configure a Route Map for Route Tagging.............................................................................................................. 106
Continue Clause........................................................................................................................................................... 106
IP Fragment Handling........................................................................................................................................................106
IP Fragments ACL Examples...................................................................................................................................... 106
Layer 4 ACL Rules Examples...................................................................................................................................... 107
Configure a Standard IP ACL........................................................................................................................................... 108
Configuring a Standard IP ACL Filter........................................................................................................................ 108
Configure an Extended IP ACL........................................................................................................................................ 109
Configuring Filters with a Sequence Number...........................................................................................................109
Configuring Filters Without a Sequence Number.....................................................................................................110
Configure Layer 2 and Layer 3 ACLs................................................................................................................................ 111
Assign an IP ACL to an Interface.......................................................................................................................................111
Applying an IP ACL............................................................................................................................................................. 112
Counting ACL Hits........................................................................................................................................................ 112
Configure Ingress ACLs..................................................................................................................................................... 112
Configure Egress ACLs...................................................................................................................................................... 113
Applying Egress Layer 3 ACLs (Control-Plane)........................................................................................................ 114
IP Prefix Lists.......................................................................................................................................................................114
Contents
5
Configuration Task List for Prefix Lists......................................................................................................................115
ACL Remarks.......................................................................................................................................................................118
Configuring a Remark...................................................................................................................................................118
Deleting a Remark.........................................................................................................................................................118
ACL Resequencing............................................................................................................................................................. 119
Resequencing an ACL or Prefix List...........................................................................................................................119
Route Maps........................................................................................................................................................................ 120
Logging of ACL Processes................................................................................................................................................ 121
Guidelines for Configuring ACL Logging.................................................................................................................... 121
Configuring ACL Logging............................................................................................................................................ 122
Flow-Based Monitoring..................................................................................................................................................... 122
Enabling Flow-Based Monitoring................................................................................................................................124
Configuring UDF ACL........................................................................................................................................................ 124
Configuring IP Mirror Access Group................................................................................................................................127
Sample Configuration...................................................................................................................................................127
Example of viewing IP mirror–access–group applied to an Interface...................................................................127
8 Bidirectional Forwarding Detection (BFD)................................................................................... 129
How BFD Works.................................................................................................................................................................129
BFD Packet Format..................................................................................................................................................... 130
BFD Sessions.................................................................................................................................................................131
BFD Three-Way Handshake....................................................................................................................................... 132
Session State Changes................................................................................................................................................133
Important Points to Remember........................................................................................................................................133
Configure BFD....................................................................................................................................................................133
Configure BFD for Physical Ports.............................................................................................................................. 134
Configure BFD for Static Routes...............................................................................................................................135
Configure BFD for IPv6 Static Routes...................................................................................................................... 138
Configure BFD for OSPF............................................................................................................................................ 140
Configure BFD for OSPFv3........................................................................................................................................ 145
Configure BFD for IS-IS...............................................................................................................................................147
Configure BFD for BGP...............................................................................................................................................149
Configure BFD for VRRP............................................................................................................................................ 156
Configuring Protocol Liveness....................................................................................................................................158
9 Border Gateway Protocol (BGP)................................................................................................ 159
BGP IP version 4 (BGPv4) Overview............................................................................................................................. 159
BGP Autonomous Systems........................................................................................................................................ 159
AS4 Number Representation.......................................................................................................................................161
Four-Byte AS Numbers...............................................................................................................................................163
BGP router ID............................................................................................................................................................... 163
Sessions and Peers...................................................................................................................................................... 163
Establish a Session.......................................................................................................................................................163
BGP Attributes for selecting Best Path.................................................................................................................... 164
Multiprotocol BGP....................................................................................................................................................... 169
BGP global and address family configuration........................................................................................................... 170
Implement BGP with Dell EMC Networking OS....................................................................................................... 171
Configuration Information........................................................................................................................................... 174
Basic BGP configuration tasks......................................................................................................................................... 174
6
Contents
Prerequisite for configuring a BGP network.............................................................................................................174
Restrictions................................................................................................................................................................... 174
Enabling BGP................................................................................................................................................................ 174
Enabling four-byte autonomous system numbers................................................................................................... 176
Changing a BGP router ID...........................................................................................................................................177
Configuring AS4 Number Representations............................................................................................................... 177
Configuring a BGP peer...............................................................................................................................................178
Example-Configuring BGP routing between peers..................................................................................................179
BGP peer group............................................................................................................................................................180
Advanced BGP configuration tasks................................................................................................................................. 187
Route-refresh and Soft-reconfiguration................................................................................................................... 187
Aggregating Routes..................................................................................................................................................... 189
Filtering BGP..................................................................................................................................................................191
Configuring BGP Fast Fall-Over.................................................................................................................................196
Configuring Passive Peering....................................................................................................................................... 197
Enabling Graceful Restart........................................................................................................................................... 198
Redistributing Routes.................................................................................................................................................. 199
Redistributing iBGP Routes into IGP......................................................................................................................... 199
Enabling Additional Paths........................................................................................................................................... 202
Configuring IP Community Lists................................................................................................................................202
Configuring an IP Extended Community List...........................................................................................................203
Configure BGP attributes...........................................................................................................................................204
Enabling Multipath.......................................................................................................................................................207
Route Reflectors......................................................................................................................................................... 208
Enabling Route Flap Dampening................................................................................................................................209
Changing BGP keepalive and hold timers.................................................................................................................. 211
Setting the extended timer.........................................................................................................................................212
Enabling or disabling BGP neighbors......................................................................................................................... 212
Route Map Continue....................................................................................................................................................213
Configuring BGP Confederations...............................................................................................................................214
Configuring a BGP VRF address family.....................................................................................................................214
Maintaining Existing AS Numbers During an AS Migration.....................................................................................215
Allowing an AS Number to Appear in its Own AS Path...........................................................................................216
Enabling MBGP Configurations.................................................................................................................................. 217
MBGP support for IPv6...............................................................................................................................................217
Configuring IPv6 MBGP between peers................................................................................................................... 217
Example-Configuring IPv4 and IPv6 neighbors........................................................................................................218
Configure IPv6 NH Automatically for IPv6 Prefix Advertised over IPv4 Neighbor............................................ 220
BGP Regular Expression Optimization......................................................................................................................222
Debugging BGP........................................................................................................................................................... 222
10 Content Addressable Memory (CAM)........................................................................................224
CAM Allocation.................................................................................................................................................................. 224
Test CAM Usage...............................................................................................................................................................225
View CAM-ACL Settings..................................................................................................................................................226
View CAM Usage...............................................................................................................................................................227
Configuring CAM Threshold and Silence Period........................................................................................................... 228
CAM Optimization.............................................................................................................................................................229
Troubleshoot CAM Profiling.............................................................................................................................................229
QoS CAM Region Limitation...................................................................................................................................... 229
Contents
7
11 Control Plane Policing (CoPP).................................................................................................. 230
Configure Control Plane Policing..................................................................................................................................... 231
Configuring CoPP for Protocols................................................................................................................................232
Configuring CoPP for CPU Queues..........................................................................................................................233
CoPP for OSPFv3 Packets........................................................................................................................................ 234
Configuring CoPP for OSPFv3..................................................................................................................................236
Displaying CoPP Configuration .................................................................................................................................237
12 Data Center Bridging (DCB)..................................................................................................... 239
Ethernet Enhancements in Data Center Bridging.........................................................................................................239
Priority-Based Flow Control.......................................................................................................................................240
Enhanced Transmission Selection..............................................................................................................................241
Data Center Bridging Exchange Protocol (DCBx)..................................................................................................242
Data Center Bridging in a Traffic Flow..................................................................................................................... 242
Enabling Data Center Bridging.........................................................................................................................................242
DCB Maps and its Attributes..................................................................................................................................... 243
Data Center Bridging: Default Configuration.................................................................................................................243
Configuring Priority-Based Flow Control....................................................................................................................... 244
Configuring Lossless Queues..................................................................................................................................... 244
Configuring PFC in a DCB Map.......................................................................................................................................246
Applying a DCB Map on a Port........................................................................................................................................247
Configuring PFC without a DCB Map.............................................................................................................................247
Priority-Based Flow Control Using Dynamic Buffer Method.......................................................................................249
Behavior of Tagged Packets............................................................................................................................................249
Configuration Example for DSCP and PFC Priorities...................................................................................................250
Using PFC to Manage Converged Ethernet Traffic......................................................................................................251
Configure Enhanced Transmission Selection................................................................................................................. 251
ETS Prerequisites and Restrictions........................................................................................................................... 251
Creating an ETS Priority Group..................................................................................................................................251
ETS Operation with DCBx..........................................................................................................................................252
Configuring Bandwidth Allocation for DCBx CIN.................................................................................................... 253
Configuring ETS in a DCB Map................................................................................................................................. 253
Hierarchical Scheduling in ETS Output Policies............................................................................................................ 254
Using ETS to Manage Converged Ethernet Traffic..................................................................................................... 255
Applying DCB Policies in a Switch Stack....................................................................................................................... 255
Configure a DCBx Operation...........................................................................................................................................255
DCBx Operation...........................................................................................................................................................255
DCBx Port Roles..........................................................................................................................................................255
DCB Configuration Exchange.................................................................................................................................... 257
Configuration Source Election................................................................................................................................... 257
Propagation of DCB Information............................................................................................................................... 257
Auto-Detection and Manual Configuration of the DCBx Version......................................................................... 258
DCBx Example............................................................................................................................................................. 258
DCBx Prerequisites and Restrictions........................................................................................................................259
Configuring DCBx........................................................................................................................................................259
Verifying the DCB Configuration.....................................................................................................................................262
QoS dot1p Traffic Classification and Queue Assignment.............................................................................................270
Configuring the Dynamic Buffer Method........................................................................................................................271
8
Contents
Sample DCB Configuration.............................................................................................................................................. 272
13 Dynamic Host Configuration Protocol (DHCP)........................................................................... 275
DHCP Packet Format and Options.................................................................................................................................275
Assign an IP Address using DHCP...................................................................................................................................276
Implementation Information............................................................................................................................................. 277
Configure the System to be a DHCP Server.................................................................................................................278
Configuring the Server for Automatic Address Allocation..................................................................................... 278
Specifying a Default Gateway....................................................................................................................................279
Configure a Method of Hostname Resolution......................................................................................................... 279
Using DNS for Address Resolution............................................................................................................................279
Using NetBIOS WINS for Address Resolution.........................................................................................................280
Creating Manual Binding Entries............................................................................................................................... 280
Debugging the DHCP Server.....................................................................................................................................280
Using DHCP Clear Commands.................................................................................................................................. 280
Configure the System to be a Relay Agent.................................................................................................................... 281
Configure the System to be a DHCP Client.................................................................................................................. 282
Configuring the DHCP Client System.......................................................................................................................282
DHCP Client on a Management Interface................................................................................................................283
DHCP Client Operation with Other Features.......................................................................................................... 284
DHCP Relay When DHCP Server and Client are in Different VRFs...........................................................................285
Configuring Route Leaking between VRFs on DHCP Relay Agent...................................................................... 285
Non-default VRF configuration for DHCPv6 helper address...................................................................................... 286
Configuring DHCP relay source interface......................................................................................................................286
Global DHCP relay source IPv4 or IPv6 configuration .......................................................................................... 286
Interface level DHCP relay source IPv4 or IPv6 configuration .............................................................................287
Configure the System for User Port Stacking (Option 230)...................................................................................... 288
Configure Secure DHCP.................................................................................................................................................. 288
Option 82 (DHCPv4 relay options)...........................................................................................................................288
DHCPv6 relay agent options..................................................................................................................................... 289
DHCP Snooping...........................................................................................................................................................289
Drop DHCP Packets on Snooped VLANs Only....................................................................................................... 293
Dynamic ARP Inspection............................................................................................................................................ 294
Configuring Dynamic ARP Inspection.......................................................................................................................294
Source Address Validation............................................................................................................................................... 295
Enabling IP Source Address Validation..................................................................................................................... 295
DHCP MAC Source Address Validation................................................................................................................... 296
Enabling IP+MAC Source Address Validation..........................................................................................................296
Viewing the Number of SAV Dropped Packets.......................................................................................................297
Clearing the Number of SAV Dropped Packets...................................................................................................... 297
14 Equal Cost Multi-Path (ECMP).................................................................................................298
ECMP for Flow-Based Affinity........................................................................................................................................298
Configuring the Hash Algorithm................................................................................................................................ 298
Enabling Deterministic ECMP Next Hop..................................................................................................................298
Configuring the Hash Algorithm Seed...................................................................................................................... 298
Link Bundle Monitoring.....................................................................................................................................................299
Managing ECMP Group Paths.................................................................................................................................. 299
Creating an ECMP Group Bundle............................................................................................................................. 300
Contents
9
Modifying the ECMP Group Threshold....................................................................................................................300
RTAG7................................................................................................................................................................................. 301
Flow-based Hashing for ECMP.......................................................................................................................................302
15 FIP Snooping.......................................................................................................................... 305
Fibre Channel over Ethernet........................................................................................................................................... 305
Ensure Robustness in a Converged Ethernet Network............................................................................................... 305
FIP Snooping on Ethernet Bridges..................................................................................................................................306
FIP Snooping in a Switch Stack...................................................................................................................................... 308
Using FIP Snooping...........................................................................................................................................................308
FIP Snooping Prerequisites........................................................................................................................................ 308
Important Points to Remember.................................................................................................................................308
Enabling the FCoE Transit Feature...........................................................................................................................309
Enable FIP Snooping on VLANs................................................................................................................................ 309
Configure the FC-MAP Value.....................................................................................................................................310
Configure a Port for a Bridge-to-Bridge Link...........................................................................................................310
Configure a Port for a Bridge-to-FCF Link...............................................................................................................310
Impact on Other Software Features......................................................................................................................... 310
FIP Snooping Restrictions...........................................................................................................................................310
Configuring FIP Snooping............................................................................................................................................ 311
Displaying FIP Snooping Information................................................................................................................................311
FCoE Transit Configuration Example.............................................................................................................................. 316
16 FIPS Cryptography.................................................................................................................. 318
Configuration Tasks...........................................................................................................................................................318
Preparing the System........................................................................................................................................................318
Enabling FIPS Mode...........................................................................................................................................................318
Generating Host-Keys.......................................................................................................................................................319
Monitoring FIPS Mode Status..........................................................................................................................................319
Disabling FIPS Mode..........................................................................................................................................................319
17 Force10 Resilient Ring Protocol (FRRP).....................................................................................321
Protocol Overview............................................................................................................................................................. 321
Ring Status...................................................................................................................................................................322
Multiple FRRP Rings................................................................................................................................................... 322
Important FRRP Points...............................................................................................................................................323
Important FRRP Concepts.........................................................................................................................................324
Implementing FRRP.......................................................................................................................................................... 324
FRRP Configuration..........................................................................................................................................................325
Creating the FRRP Group.......................................................................................................................................... 325
Configuring the Control VLAN...................................................................................................................................325
Configuring and Adding the Member VLANs.......................................................................................................... 326
Setting the FRRP Timers............................................................................................................................................327
Clearing the FRRP Counters......................................................................................................................................327
Viewing the FRRP Configuration...............................................................................................................................327
Viewing the FRRP Information.................................................................................................................................. 327
Troubleshooting FRRP......................................................................................................................................................328
Sample Configuration and Topology...............................................................................................................................328
FRRP Support on VLT......................................................................................................................................................329
10
Contents
18 GARP VLAN Registration Protocol (GVRP)................................................................................332
Configure GVRP................................................................................................................................................................333
Enabling GVRP Globally....................................................................................................................................................333
Enabling GVRP on a Layer 2 Interface........................................................................................................................... 334
Configure GVRP Registration..........................................................................................................................................334
Configure a GARP Timer..................................................................................................................................................335
RPM Redundancy............................................................................................................................................................. 335
19 High Availability (HA).............................................................................................................. 336
Component Redundancy..................................................................................................................................................336
Automatic and Manual Stack Unit Failover..............................................................................................................336
Synchronization between Management and Standby Units..................................................................................337
Forcing a Stack Unit Failover..................................................................................................................................... 337
Specifying an Auto-Failover Limit..............................................................................................................................337
Disabling Auto-Reboot................................................................................................................................................ 337
Pre-Configuring a Stack Unit Slot...................................................................................................................................338
Removing a Provisioned Logical Stack Unit.................................................................................................................. 338
Hitless Behavior.................................................................................................................................................................338
Graceful Restart................................................................................................................................................................ 338
Software Resiliency...........................................................................................................................................................339
Software Component Health Monitoring.................................................................................................................339
System Health Monitoring......................................................................................................................................... 339
Failure and Event Logging..........................................................................................................................................339
Hot-Lock Behavior............................................................................................................................................................340
20 Internet Group Management Protocol (IGMP)........................................................................... 341
IGMP Protocol Overview..................................................................................................................................................341
IGMP Version 2............................................................................................................................................................ 341
IGMP Version 3............................................................................................................................................................342
Configure IGMP.................................................................................................................................................................345
Viewing IGMP Enabled Interfaces...................................................................................................................................345
Selecting an IGMP Version.............................................................................................................................................. 346
Viewing IGMP Groups.......................................................................................................................................................347
Adjusting Timers................................................................................................................................................................ 347
Adjusting Query and Response Timers..................................................................................................................... 347
Preventing a Host from Joining a Group........................................................................................................................348
Enabling IGMP Immediate-Leave....................................................................................................................................350
IGMP Snooping.................................................................................................................................................................. 351
Configuring IGMP Snooping....................................................................................................................................... 351
Removing a Group-Port Association......................................................................................................................... 351
Disabling Multicast Flooding.......................................................................................................................................352
Specifying a Port as Connected to a Multicast Router..........................................................................................352
Configuring the Switch as Querier............................................................................................................................352
Fast Convergence after MSTP Topology Changes......................................................................................................353
Egress Interface Selection (EIS) for HTTP and IGMP Applications...........................................................................353
Designating a Multicast Router Interface...................................................................................................................... 359
21 Interfaces...............................................................................................................................360
Contents
11
Interface Types.................................................................................................................................................................. 361
View Basic Interface Information.....................................................................................................................................361
Resetting an Interface to its Factory Default State..................................................................................................... 363
Enabling a Physical Interface........................................................................................................................................... 363
Physical Interfaces............................................................................................................................................................ 363
Configuration Task List for Physical Interfaces.......................................................................................................364
Overview of Layer Modes..........................................................................................................................................364
Configuring Layer 2 (Data Link) Mode..................................................................................................................... 364
Configuring Layer 2 (Interface) Mode......................................................................................................................365
Configuring Layer 3 (Network) Mode...................................................................................................................... 365
Configuring Layer 3 (Interface) Mode......................................................................................................................365
Automatic recovery of an Err-disabled interface..........................................................................................................366
Configuring an automatic recovery for an Err-disabled interface.........................................................................366
Egress Interface Selection (EIS)..................................................................................................................................... 367
Configuring EIS............................................................................................................................................................ 367
Management Interfaces................................................................................................................................................... 368
Configuring Management Interfaces........................................................................................................................368
Configuring a Management Interface on an Ethernet Port...................................................................................369
VLAN Interfaces................................................................................................................................................................ 370
Loopback Interfaces......................................................................................................................................................... 370
Null Interfaces.....................................................................................................................................................................371
Configuring Port Delay...................................................................................................................................................... 371
Port Channel Interfaces.................................................................................................................................................... 371
Port Channel Definition and Standards..................................................................................................................... 371
Port Channel Benefits.................................................................................................................................................372
Port Channel Implementation.................................................................................................................................... 372
Interfaces in Port Channels........................................................................................................................................372
Configuration Tasks for Port Channel Interfaces....................................................................................................372
Creating a Port Channel............................................................................................................................................. 373
Adding a Physical Interface to a Port Channel........................................................................................................ 373
Reassigning an Interface to a New Port Channel................................................................................................... 375
Configuring the Minimum Oper Up Links in a Port Channel.................................................................................. 375
Adding or Removing a Port Channel from a VLAN.................................................................................................375
Assigning an IP Address to a Port Channel..............................................................................................................376
Deleting or Disabling a Port Channel......................................................................................................................... 377
Load Balancing Through Port Channels....................................................................................................................377
Changing the Hash Algorithm.................................................................................................................................... 377
Bulk Configuration.............................................................................................................................................................378
Interface Range........................................................................................................................................................... 378
Bulk Configuration Examples......................................................................................................................................378
Defining Interface Range Macros....................................................................................................................................379
Define the Interface Range........................................................................................................................................380
Choosing an Interface-Range Macro........................................................................................................................380
Monitoring and Maintaining Interfaces...........................................................................................................................380
Maintenance Using TDR..............................................................................................................................................381
Non Dell-Qualified Transceivers.......................................................................................................................................381
Splitting 40G Ports without Reload................................................................................................................................ 382
Splitting QSFP Ports to SFP+ Ports.............................................................................................................................. 383
Converting a QSFP or QSFP+ Port to an SFP or SFP+ Port..................................................................................... 384
Link Dampening................................................................................................................................................................. 386
12
Contents
Enabling Link Dampening............................................................................................................................................388
Link Bundle Monitoring.....................................................................................................................................................389
Using Ethernet Pause Frames for Flow Control........................................................................................................... 389
Enabling Pause Frames...............................................................................................................................................390
Configure the MTU Size on an Interface.......................................................................................................................390
Port-Pipes...........................................................................................................................................................................391
Auto-Negotiation on Ethernet Interfaces.......................................................................................................................391
Setting the Speed of Ethernet Interfaces................................................................................................................392
Set Auto-Negotiation Options................................................................................................................................... 393
View Advanced Interface Information............................................................................................................................393
Configuring the Interface Sampling Size..................................................................................................................394
Configuring the Traffic Sampling Size Globally............................................................................................................. 395
Dynamic Counters.............................................................................................................................................................396
Clearing Interface Counters....................................................................................................................................... 397
Discard Counters...............................................................................................................................................................397
Display discard counters.............................................................................................................................................397
22 Internet Protocol Security (IPSec)...........................................................................................399
Configuring IPSec ............................................................................................................................................................ 399
23 IPv4 Routing...........................................................................................................................401
IP Addresses...................................................................................................................................................................... 402
Configuration Tasks for IP Addresses............................................................................................................................ 402
Assigning IP Addresses to an Interface..........................................................................................................................402
Configuring Static Routes................................................................................................................................................403
Adding description for IPv4 and IPv6 static routes................................................................................................ 404
Configure Static Routes for the Management Interface.............................................................................................404
IPv4 Path MTU Discovery Overview..............................................................................................................................405
Using the Configured Source IP Address in ICMP Messages.....................................................................................405
Configuring the Duration to Establish a TCP Connection........................................................................................... 406
Enabling Directed Broadcast........................................................................................................................................... 406
Resolution of Host Names............................................................................................................................................... 406
Enabling Dynamic Resolution of Host Names................................................................................................................407
Specifying the Local System Domain and a List of Domains.......................................................................................407
Configuring DNS with Traceroute...................................................................................................................................407
ARP..................................................................................................................................................................................... 408
Configuration Tasks for ARP........................................................................................................................................... 408
Configuring Static ARP Entries....................................................................................................................................... 408
Enabling Proxy ARP.......................................................................................................................................................... 409
Clearing ARP Cache..........................................................................................................................................................409
ARP Learning via Gratuitous ARP...................................................................................................................................409
Enabling ARP Learning via Gratuitous ARP....................................................................................................................410
ARP Learning via ARP Request....................................................................................................................................... 410
Configuring ARP Retries....................................................................................................................................................411
ICMP.....................................................................................................................................................................................411
Configuration Tasks for ICMP...........................................................................................................................................411
Enabling ICMP Unreachable Messages........................................................................................................................... 411
ICMP Redirects.................................................................................................................................................................. 412
UDP Helper......................................................................................................................................................................... 412
Contents
13
Enabling UDP Helper......................................................................................................................................................... 413
Configuring a Broadcast Address.................................................................................................................................... 413
Configurations Using UDP Helper....................................................................................................................................414
UDP Helper with Broadcast-All Addresses.....................................................................................................................414
UDP Helper with Subnet Broadcast Addresses.............................................................................................................415
UDP Helper with Configured Broadcast Addresses......................................................................................................415
UDP Helper with No Configured Broadcast Addresses................................................................................................416
Troubleshooting UDP Helper............................................................................................................................................416
24 IPv6 Routing........................................................................................................................... 417
Protocol Overview............................................................................................................................................................. 417
Extended Address Space............................................................................................................................................ 417
Stateless Autoconfiguration........................................................................................................................................417
IPv6 Headers................................................................................................................................................................ 418
IPv6 Header Fields....................................................................................................................................................... 418
Extension Header Fields............................................................................................................................................. 420
Addressing.....................................................................................................................................................................421
Implementing IPv6 with Dell EMC Networking OS....................................................................................................... 421
ICMPv6...............................................................................................................................................................................423
Path MTU discovery......................................................................................................................................................... 423
IPv6 Neighbor Discovery..................................................................................................................................................424
IPv6 Neighbor Discovery of MTU Packets.............................................................................................................. 425
Configuration Task List for IPv6 RDNSS....................................................................................................................... 425
Configuring the IPv6 Recursive DNS Server...........................................................................................................425
Debugging IPv6 RDNSS Information Sent to the Host .........................................................................................426
Displaying IPv6 RDNSS Information......................................................................................................................... 426
Secure Shell (SSH) Over an IPv6 Transport................................................................................................................. 427
Configuration Tasks for IPv6........................................................................................................................................... 427
Adjusting Your CAM-Profile....................................................................................................................................... 427
Assigning an IPv6 Address to an Interface.............................................................................................................. 428
Assigning a Static IPv6 Route....................................................................................................................................428
Configuring Telnet with IPv6..................................................................................................................................... 429
SNMP over IPv6..........................................................................................................................................................429
Displaying IPv6 Information........................................................................................................................................429
Displaying an IPv6 Interface Information..................................................................................................................430
Showing IPv6 Routes..................................................................................................................................................430
Showing the Running-Configuration for an Interface............................................................................................. 431
Clearing IPv6 Routes...................................................................................................................................................432
Disabling ND Entry Timeout....................................................................................................................................... 432
Configuring IPv6 RA Guard..............................................................................................................................................432
Configuring IPv6 RA Guard on an Interface............................................................................................................ 434
Monitoring IPv6 RA Guard......................................................................................................................................... 434
25 iSCSI Optimization................................................................................................................. 435
iSCSI Optimization Overview...........................................................................................................................................435
Monitoring iSCSI Traffic Flows..................................................................................................................................436
Application of Quality of Service to iSCSI Traffic Flows........................................................................................ 436
Information Monitored in iSCSI Traffic Flows..........................................................................................................437
Detection and Auto-Configuration for Dell EqualLogic Arrays.............................................................................. 437
14
Contents
Configuring Detection and Ports for Dell Compellent Arrays................................................................................ 438
Synchronizing iSCSI Sessions Learned on VLT-Lags with VLT-Peer.................................................................. 438
Enable and Disable iSCSI Optimization.....................................................................................................................439
Default iSCSI Optimization Values.................................................................................................................................. 439
iSCSI Optimization Prerequisites.....................................................................................................................................439
Configuring iSCSI Optimization.......................................................................................................................................440
Displaying iSCSI Optimization Information......................................................................................................................441
26 Intermediate System to Intermediate System........................................................................... 443
IS-IS Protocol Overview...................................................................................................................................................443
IS-IS Addressing................................................................................................................................................................ 443
Multi-Topology IS-IS......................................................................................................................................................... 444
Transition Mode...........................................................................................................................................................444
Interface Support........................................................................................................................................................ 444
Adjacencies...................................................................................................................................................................444
Graceful Restart................................................................................................................................................................445
Timers........................................................................................................................................................................... 445
Implementation Information.............................................................................................................................................445
Configuration Information................................................................................................................................................ 446
Configuration Tasks for IS-IS.....................................................................................................................................446
Configuring the Distance of a Route........................................................................................................................ 453
Changing the IS-Type.................................................................................................................................................453
Redistributing IPv4 Routes........................................................................................................................................ 455
Redistributing IPv6 Routes........................................................................................................................................ 455
Configuring Authentication Passwords.................................................................................................................... 456
Setting the Overload Bit.............................................................................................................................................456
Debugging IS-IS........................................................................................................................................................... 457
IS-IS Metric Styles............................................................................................................................................................ 458
Configure Metric Values...................................................................................................................................................458
Maximum Values in the Routing Table..................................................................................................................... 458
Change the IS-IS Metric Style in One Level Only................................................................................................... 458
Leaks from One Level to Another.............................................................................................................................460
Sample Configurations..................................................................................................................................................... 460
27 Link Aggregation Control Protocol (LACP)................................................................................463
Introduction to Dynamic LAGs and LACP......................................................................................................................463
Important Points to Remember.................................................................................................................................463
LACP Modes................................................................................................................................................................463
Configuring LACP Commands...................................................................................................................................464
LACP Configuration Tasks...............................................................................................................................................464
Creating a LAG............................................................................................................................................................ 464
Configuring the LAG Interfaces as Dynamic............................................................................................................465
Setting the LACP Long Timeout............................................................................................................................... 465
Monitoring and Debugging LACP..............................................................................................................................466
Shared LAG State Tracking............................................................................................................................................. 466
Configuring Shared LAG State Tracking.................................................................................................................. 467
Important Points about Shared LAG State Tracking..............................................................................................468
LACP Basic Configuration Example................................................................................................................................468
Configure a LAG on ALPHA.......................................................................................................................................468
Contents
15
28 Layer 2...................................................................................................................................476
Manage the MAC Address Table.................................................................................................................................... 476
Clearing the MAC Address Table.............................................................................................................................. 476
Setting the Aging Time for Dynamic Entries............................................................................................................476
Configuring a Static MAC Address........................................................................................................................... 476
Displaying the MAC Address Table............................................................................................................................477
MAC Learning Limit...........................................................................................................................................................477
Setting the MAC Learning Limit................................................................................................................................ 477
mac learning-limit Dynamic.........................................................................................................................................478
mac learning-limit mac-address-sticky..................................................................................................................... 478
mac learning-limit station-move................................................................................................................................ 478
mac learning-limit no-station-move.......................................................................................................................... 478
Learning Limit Violation Actions.................................................................................................................................479
Setting Station Move Violation Actions....................................................................................................................479
Recovering from Learning Limit and Station Move Violations...............................................................................479
Enabling port security................................................................................................................................................. 480
NIC Teaming...................................................................................................................................................................... 480
Configure Redundant Pairs...............................................................................................................................................481
Far-End Failure Detection................................................................................................................................................ 484
FEFD State Changes.................................................................................................................................................. 484
Configuring FEFD........................................................................................................................................................485
Enabling FEFD on an Interface.................................................................................................................................. 486
Debugging FEFD..........................................................................................................................................................486
29 Link Layer Discovery Protocol (LLDP).......................................................................................488
802.1AB (LLDP) Overview...............................................................................................................................................488
Protocol Data Units.....................................................................................................................................................488
Optional TLVs.................................................................................................................................................................... 489
Management TLVs......................................................................................................................................................489
TIA-1057 (LLDP-MED) Overview...................................................................................................................................490
TIA Organizationally Specific TLVs............................................................................................................................ 491
Configure LLDP................................................................................................................................................................. 494
CONFIGURATION versus INTERFACE Configurations............................................................................................... 494
Enabling LLDP................................................................................................................................................................... 495
Disabling and Undoing LLDP......................................................................................................................................495
Enabling LLDP on Management Ports........................................................................................................................... 495
Disabling and Undoing LLDP on Management Ports..............................................................................................496
Advertising TLVs............................................................................................................................................................... 496
Storing and Viewing Unrecognized LLDP TLVs............................................................................................................ 497
Viewing the LLDP Configuration.....................................................................................................................................498
Viewing Information Advertised by Adjacent LLDP Neighbors...................................................................................498
Examples of Viewing Information Advertised by Neighbors..................................................................................498
Configuring LLDPDU Intervals......................................................................................................................................... 501
Configuring LLDP Notification Interval........................................................................................................................... 501
Configuring LLDP Notification Interval.......................................................................................................................... 502
Configuring Transmit and Receive Mode.......................................................................................................................502
Configuring the Time to Live Value................................................................................................................................ 503
Debugging LLDP............................................................................................................................................................... 503
16
Contents
Relevant Management Objects.......................................................................................................................................504
30 Microsoft Network Load Balancing...........................................................................................509
Configuring a Switch for NLB .........................................................................................................................................510
Enabling a Switch for Multicast NLB.........................................................................................................................510
31 Multicast Source Discovery Protocol (MSDP)............................................................................ 512
Anycast RP......................................................................................................................................................................... 513
Implementation Information..............................................................................................................................................514
Configure Multicast Source Discovery Protocol............................................................................................................514
Related Configuration Tasks.......................................................................................................................................514
Enable MSDP......................................................................................................................................................................518
Manage the Source-Active Cache.................................................................................................................................. 519
Viewing the Source-Active Cache.............................................................................................................................519
Limiting the Source-Active Cache.............................................................................................................................519
Clearing the Source-Active Cache............................................................................................................................ 519
Enabling the Rejected Source-Active Cache.......................................................................................................... 520
Accept Source-Active Messages that Fail the RFP Check.........................................................................................520
Specifying Source-Active Messages.............................................................................................................................. 522
Limiting the Source-Active Messages from a Peer......................................................................................................523
Preventing MSDP from Caching a Local Source..........................................................................................................523
Preventing MSDP from Caching a Remote Source..................................................................................................... 523
Preventing MSDP from Advertising a Local Source.....................................................................................................524
Logging Changes in Peership States..............................................................................................................................525
Terminating a Peership.....................................................................................................................................................525
Clearing Peer Statistics.................................................................................................................................................... 525
Debugging MSDP..............................................................................................................................................................526
MSDP with Anycast RP................................................................................................................................................... 526
Configuring Anycast RP................................................................................................................................................... 527
Reducing Source-Active Message Flooding............................................................................................................ 528
Specifying the RP Address Used in SA Messages..................................................................................................528
MSDP Sample Configurations.........................................................................................................................................530
32 Multicast Listener Discovery Protocol...................................................................................... 533
MLD timers........................................................................................................................................................................ 536
Reducing Host Response Burstiness........................................................................................................................536
Configuring MLD Version.................................................................................................................................................536
Clearing MLD groups........................................................................................................................................................ 537
Debugging MLD.................................................................................................................................................................537
Explicit Tracking.................................................................................................................................................................537
Reducing Leave Latency.................................................................................................................................................. 537
Displaying MLD groups table........................................................................................................................................... 537
Displaying MLD Interfaces............................................................................................................................................... 538
33 Multiple Spanning Tree Protocol (MSTP)................................................................................. 539
Spanning Tree Variations................................................................................................................................................. 540
Implementation Information.......................................................................................................................................540
Configure Multiple Spanning Tree Protocol...................................................................................................................540
Related Configuration Tasks......................................................................................................................................540
Contents
17
Enable Multiple Spanning Tree Globally.......................................................................................................................... 541
Adding and Removing Interfaces.....................................................................................................................................541
Creating Multiple Spanning Tree Instances....................................................................................................................541
Influencing MSTP Root Selection................................................................................................................................... 542
Interoperate with Non-Dell Bridges................................................................................................................................ 543
Changing the Region Name or Revision.........................................................................................................................543
Modifying Global Parameters.......................................................................................................................................... 543
Modifying the Interface Parameters...............................................................................................................................544
Setting STP path cost as constant................................................................................................................................ 545
Configuring an EdgePort..................................................................................................................................................545
Flush MAC Addresses after a Topology Change.......................................................................................................... 546
MSTP Sample Configurations......................................................................................................................................... 546
Debugging and Verifying MSTP Configurations........................................................................................................... 550
34 Multicast Features..................................................................................................................552
Enabling IP Multicast........................................................................................................................................................ 552
Implementation Information.............................................................................................................................................552
Multicast Policies...............................................................................................................................................................553
IPv4 Multicast Policies................................................................................................................................................553
Understanding Multicast Traceroute (mtrace).............................................................................................................559
Printing Multicast Traceroute (mtrace) Paths..............................................................................................................559
Supported Error Codes..................................................................................................................................................... 561
mtrace Scenarios............................................................................................................................................................... 561
35 Multicast Listener Discovery Protocol...................................................................................... 567
MLD timers........................................................................................................................................................................ 570
Reducing Host Response Burstiness........................................................................................................................570
Clearing MLD groups........................................................................................................................................................ 570
Debugging MLD..................................................................................................................................................................571
Explicit Tracking................................................................................................................................................................. 571
Reducing Leave Latency...................................................................................................................................................571
Displaying MLD groups table............................................................................................................................................ 571
Displaying MLD Interfaces................................................................................................................................................ 571
MLD Snooping................................................................................................................................................................... 572
Enable MLD Snooping.................................................................................................................................................572
Disable MLD Snooping................................................................................................................................................572
Configure the switch as a querier............................................................................................................................. 572
Specify port as connected to multicast router........................................................................................................573
Enable Snooping Explicit Tracking.............................................................................................................................573
Display the MLD Snooping Table...............................................................................................................................573
36 Object Tracking...................................................................................................................... 574
Object Tracking Overview................................................................................................................................................574
Track Layer 2 Interfaces.............................................................................................................................................575
Track Layer 3 Interfaces.............................................................................................................................................575
Track IPv4 and IPv6 Routes...................................................................................................................................... 575
Set Tracking Delays.....................................................................................................................................................576
VRRP Object Tracking................................................................................................................................................ 577
Object Tracking Configuration.........................................................................................................................................577
18
Contents
Tracking a Layer 2 Interface.......................................................................................................................................577
Tracking a Layer 3 Interface...................................................................................................................................... 578
Track an IPv4/IPv6 Route......................................................................................................................................... 579
Displaying Tracked Objects..............................................................................................................................................582
37 Open Shortest Path First (OSPFv2 and OSPFv3)...................................................................... 584
Protocol Overview............................................................................................................................................................ 584
Autonomous System (AS) Areas.............................................................................................................................. 584
Area Types................................................................................................................................................................... 585
Networks and Neighbors............................................................................................................................................586
Router Types............................................................................................................................................................... 586
Designated and Backup Designated Routers...........................................................................................................587
Link-State Advertisements (LSAs)........................................................................................................................... 587
Router Priority and Cost.............................................................................................................................................588
OSPF with Dell EMC Networking OS.............................................................................................................................589
Graceful Restart..........................................................................................................................................................589
Fast Convergence (OSPFv2, IPv4 Only).................................................................................................................590
Multi-Process OSPFv2 with VRF............................................................................................................................. 590
OSPF ACK Packing......................................................................................................................................................591
Setting OSPF Adjacency with Cisco Routers.......................................................................................................... 591
Configuration Information.................................................................................................................................................591
Configuration Task List for OSPFv2 (OSPF for IPv4)........................................................................................... 592
OSPFv3 NSSA.............................................................................................................................................................603
Configuration Task List for OSPFv3 (OSPF for IPv6)...........................................................................................604
MIB Support for OSPFv3................................................................................................................................................. 615
Viewing the OSPFv3 MIB........................................................................................................................................... 615
Configuration Task List for OSPFv3 (OSPF for IPv6)..................................................................................................616
Enabling IPv6 Unicast Routing................................................................................................................................... 616
Applying cost for OSPFv3.......................................................................................................................................... 616
Assigning IPv6 Addresses on an Interface................................................................................................................617
Assigning Area ID on an Interface.............................................................................................................................. 617
Assigning OSPFv3 Process ID and Router ID Globally............................................................................................ 617
Assigning OSPFv3 Process ID and Router ID to a VRF.......................................................................................... 618
Configuring Stub Areas............................................................................................................................................... 618
Configuring Passive-Interface....................................................................................................................................618
Redistributing Routes.................................................................................................................................................. 619
Configuring a Default Route....................................................................................................................................... 619
Enabling OSPFv3 Graceful Restart........................................................................................................................... 619
OSPFv3 Authentication Using IPsec......................................................................................................................... 621
Troubleshooting OSPFv3........................................................................................................................................... 627
38 Policy-based Routing (PBR).................................................................................................... 628
Overview............................................................................................................................................................................ 628
Implementing PBR.............................................................................................................................................................629
Configuration Task List for Policy-based Routing........................................................................................................ 629
Create a Redirect List.................................................................................................................................................630
Create a Rule for a Redirect-list................................................................................................................................630
Apply a Redirect-list to an Interface using a Redirect-group................................................................................. 631
Sample Configuration....................................................................................................................................................... 634
Contents
19
39 PIM Sparse-Mode (PIM-SM)................................................................................................... 638
Implementation Information.............................................................................................................................................638
Protocol Overview............................................................................................................................................................ 638
Requesting Multicast Traffic......................................................................................................................................638
Refuse Multicast Traffic.............................................................................................................................................638
Send Multicast Traffic................................................................................................................................................ 639
Configuring PIM-SM.........................................................................................................................................................639
Related Configuration Tasks......................................................................................................................................639
Enable PIM-SM................................................................................................................................................................. 639
Configuring S,G Expiry Timers......................................................................................................................................... 641
Configuring a Static Rendezvous Point......................................................................................................................... 642
Overriding Bootstrap Router Updates......................................................................................................................642
Configuring a Designated Router....................................................................................................................................643
Creating Multicast Boundaries and Domains.................................................................................................................644
Electing an RP using the BSR Mechanism.................................................................................................................... 644
40 PIM Source-Specific Mode (PIM-SSM).................................................................................... 646
Implementation Information.............................................................................................................................................646
Configure PIM-SSM......................................................................................................................................................... 646
Enabling PIM-SSM............................................................................................................................................................ 647
Use PIM-SSM with IGMP Version 2 Hosts................................................................................................................... 647
Electing an RP using the BSR Mechanism.................................................................................................................... 649
Enabling RP to Server Specific Multicast Groups.................................................................................................. 650
41 Port Monitoring.......................................................................................................................651
Important Points to Remember....................................................................................................................................... 651
Port Monitoring..................................................................................................................................................................651
Configuring Port Monitoring............................................................................................................................................654
Configuring Monitor Multicast Queue............................................................................................................................655
Enabling Flow-Based Monitoring.................................................................................................................................... 655
Remote Port Mirroring..................................................................................................................................................... 656
Remote Port Mirroring Example................................................................................................................................657
Configuring Remote Port Mirroring.......................................................................................................................... 657
Displaying Remote-Port Mirroring Configurations..................................................................................................659
Configuration procedure for Remote Port Mirroring..............................................................................................659
Encapsulated Remote Port Monitoring..........................................................................................................................663
ERPM Behavior on a typical Dell EMC Networking OS ..............................................................................................665
Port Monitoring on VLT................................................................................................................................................... 666
42 Private VLANs (PVLAN).......................................................................................................... 669
Private VLAN Concepts...................................................................................................................................................669
Using the Private VLAN Commands...............................................................................................................................670
Configuration Task List......................................................................................................................................................671
Creating PVLAN ports.................................................................................................................................................671
Creating a Primary VLAN............................................................................................................................................ 671
Creating a Community VLAN.....................................................................................................................................672
Creating an Isolated VLAN......................................................................................................................................... 673
Private VLAN Configuration Example.............................................................................................................................674
20
Contents
/